Skip to content

Conversation

@cyrixrr
Copy link
Owner

@cyrixrr cyrixrr commented Nov 20, 2025

snyk-top-banner

Snyk has created this PR to upgrade com.thoughtworks.xstream:xstream from 1.4.5 to 1.4.21.

ℹ️ Keep your dependencies up-to-date. This makes it easier to fix existing vulnerabilities and to more quickly identify and fix newly disclosed vulnerabilities when they affect your project.


  • The recommended version is 23 versions ahead of your current version.

  • The recommended version was released a year ago.

Issues fixed by the recommended upgrade:

Issue Score Exploit Maturity
high severity Denial of Service (DoS)
SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-2388977
589 No Known Exploit
high severity XML External Entity (XXE) Injection
SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-30385
589 No Known Exploit
high severity Denial of Service (DoS)
SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-31394
589 No Known Exploit
high severity Deserialization of Untrusted Data
SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-8352924
589 Proof of Concept
high severity Deserialization of Untrusted Data
SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1040458
589 Proof of Concept
high severity Deserialization of Untrusted Data
SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1088337
589 Proof of Concept
high severity Arbitrary Code Execution
SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1569176
589 Proof of Concept
high severity Arbitrary Code Execution
SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1569177
589 Proof of Concept
high severity Arbitrary Code Execution
SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1569178
589 Proof of Concept
high severity Arbitrary Code Execution
SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1569179
589 Proof of Concept
high severity Arbitrary Code Execution
SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1569180
589 Proof of Concept
high severity Arbitrary Code Execution
SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1569181
589 Proof of Concept
high severity Arbitrary Code Execution
SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1569182
589 Proof of Concept
high severity Remote Code Execution (RCE)
SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1569183
589 Mature
high severity Arbitrary Code Execution
SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1569185
589 Proof of Concept
high severity Arbitrary Code Execution
SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1569186
589 Proof of Concept
high severity Arbitrary Code Execution
SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1569187
589 Proof of Concept
high severity Deserialization of Untrusted Data
SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1569190
589 Proof of Concept
high severity Server-Side Request Forgery (SSRF)
SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1569191
589 Proof of Concept
medium severity Denial of Service (DoS)
SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-3091180
589 No Known Exploit
medium severity Denial of Service (DoS)
SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-3182897
589 Proof of Concept
medium severity Insecure XML deserialization
SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-460764
589 Mature
medium severity Arbitrary File Deletion
SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1051966
589 Proof of Concept
medium severity Server-Side Request Forgery (SSRF)
SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1051967
589 Mature
medium severity Deserialization of Untrusted Data
SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1088328
589 Proof of Concept
medium severity Deserialization of Untrusted Data
SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1088329
589 Proof of Concept
medium severity Deserialization of Untrusted Data
SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1088330
589 Proof of Concept
medium severity Deserialization of Untrusted Data
SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1088331
589 Proof of Concept
medium severity Deserialization of Untrusted Data
SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1088332
589 Proof of Concept
medium severity Deserialization of Untrusted Data
SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1088333
589 Proof of Concept
medium severity Deserialization of Untrusted Data
SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1088334
589 Proof of Concept
medium severity Deserialization of Untrusted Data
SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1088335
589 Proof of Concept
medium severity Deserialization of Untrusted Data
SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1088336
589 Proof of Concept
medium severity Deserialization of Untrusted Data
SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1088338
589 Proof of Concept
medium severity Deserialization of Untrusted Data
SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1294540
589 Proof of Concept
medium severity Denial of Service (DoS)
SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1569189
589 Proof of Concept

Important

  • Check the changes in this PR to ensure they won't cause issues with your project.
  • This PR was automatically created by Snyk using the credentials of a real user.
  • Max score is 1000. Note that the real score may have changed since the PR was raised.

Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open upgrade PRs.

For more information:

Snyk has created this PR to upgrade com.thoughtworks.xstream:xstream from 1.4.5 to 1.4.21.

See this package in maven:
com.thoughtworks.xstream:xstream

See this project in Snyk:
https://app.snyk.io/org/cyrixrr/project/47cf0bd1-d66e-4b09-8d5b-7ceb91768efb?utm_source=github&utm_medium=referral&page=upgrade-pr
@socket-security
Copy link

Review the following changes in direct dependencies. Learn more about Socket for GitHub.

Diff Package Supply Chain
Security
Vulnerability Quality Maintenance License
Updatedcom.thoughtworks.xstream/​xstream@​1.4.5 ⏵ 1.4.2136100 +7590100100

View full report

@socket-security
Copy link

Warning

Review the following alerts detected in dependencies.

According to your organization's Security Policy, it is recommended to resolve "Warn" alerts. Learn more about Socket for GitHub.

Action Severity Alert  (click "▶" to expand/collapse)
Warn Critical
Critical CVE: jackson-databind polymorphic typing issue in maven com.fasterxml.jackson.core:jackson-databind

CVE: GHSA-gjmw-vf9h-g25v jackson-databind polymorphic typing issue (CRITICAL)

Affected versions: >= 2.9.0 < 2.9.10.1; >= 2.7.0 < 2.8.11.5; < 2.6.7.3

Patched version: 2.9.10.1

From: pom.xmlmaven/io.jsonwebtoken/jjwt@0.9.1maven/com.fasterxml.jackson.core/jackson-databind@2.9.6

ℹ Read more on: This package | This alert | What is a critical CVE?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Remove or replace dependencies that include known critical CVEs. Consumers can use dependency overrides or npm audit fix --force to remove vulnerable dependencies.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore maven/com.fasterxml.jackson.core/jackson-databind@2.9.6. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Warn Critical
Critical CVE: jackson-databind mishandles the interaction between serialization gadgets and typing in maven com.fasterxml.jackson.core:jackson-databind

CVE: GHSA-5p34-5m6p-p58g jackson-databind mishandles the interaction between serialization gadgets and typing (CRITICAL)

Affected versions: >= 2.9.0 < 2.9.10.4

Patched version: 2.9.10.4

From: pom.xmlmaven/io.jsonwebtoken/jjwt@0.9.1maven/com.fasterxml.jackson.core/jackson-databind@2.9.6

ℹ Read more on: This package | This alert | What is a critical CVE?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Remove or replace dependencies that include known critical CVEs. Consumers can use dependency overrides or npm audit fix --force to remove vulnerable dependencies.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore maven/com.fasterxml.jackson.core/jackson-databind@2.9.6. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Warn Critical
Critical CVE: jackson-databind mishandles the interaction between serialization gadgets and typing in maven com.fasterxml.jackson.core:jackson-databind

CVE: GHSA-p43x-xfjf-5jhr jackson-databind mishandles the interaction between serialization gadgets and typing (CRITICAL)

Affected versions: >= 2.9.0 < 2.9.10.4; >= 2.8.0 < 2.8.11.6; >= 2.0.0 < 2.7.9.7

Patched version: 2.9.10.4

From: pom.xmlmaven/io.jsonwebtoken/jjwt@0.9.1maven/com.fasterxml.jackson.core/jackson-databind@2.9.6

ℹ Read more on: This package | This alert | What is a critical CVE?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Remove or replace dependencies that include known critical CVEs. Consumers can use dependency overrides or npm audit fix --force to remove vulnerable dependencies.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore maven/com.fasterxml.jackson.core/jackson-databind@2.9.6. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Warn Critical
Critical CVE: jackson-databind mishandles the interaction between serialization gadgets and typing in maven com.fasterxml.jackson.core:jackson-databind

CVE: GHSA-q93h-jc49-78gg jackson-databind mishandles the interaction between serialization gadgets and typing (CRITICAL)

Affected versions: >= 2.9.0 < 2.9.10.4; >= 2.8.0 < 2.8.11.6; >= 2.0.0 < 2.7.9.7

Patched version: 2.9.10.4

From: pom.xmlmaven/io.jsonwebtoken/jjwt@0.9.1maven/com.fasterxml.jackson.core/jackson-databind@2.9.6

ℹ Read more on: This package | This alert | What is a critical CVE?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Remove or replace dependencies that include known critical CVEs. Consumers can use dependency overrides or npm audit fix --force to remove vulnerable dependencies.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore maven/com.fasterxml.jackson.core/jackson-databind@2.9.6. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Warn Critical
Critical CVE: Deserialization of Untrusted Data in jackson-databind in maven com.fasterxml.jackson.core:jackson-databind

CVE: GHSA-mx9v-gmh4-mgqw Deserialization of Untrusted Data in jackson-databind (CRITICAL)

Affected versions: >= 2.7.0 < 2.7.9.5; >= 2.9.0 < 2.9.8; >= 2.8.0 < 2.8.11.3

Patched version: 2.9.8

From: pom.xmlmaven/io.jsonwebtoken/jjwt@0.9.1maven/com.fasterxml.jackson.core/jackson-databind@2.9.6

ℹ Read more on: This package | This alert | What is a critical CVE?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Remove or replace dependencies that include known critical CVEs. Consumers can use dependency overrides or npm audit fix --force to remove vulnerable dependencies.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore maven/com.fasterxml.jackson.core/jackson-databind@2.9.6. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Warn Critical
Critical CVE: Deserialization of Untrusted Data in jackson-databind in maven com.fasterxml.jackson.core:jackson-databind

CVE: GHSA-4w82-r329-3q67 Deserialization of Untrusted Data in jackson-databind (CRITICAL)

Affected versions: >= 2.0.0 < 2.6.7.4; >= 2.7.0 < 2.7.9.7; >= 2.8.0 < 2.8.11.5; >= 2.9.0 < 2.9.10.3

Patched version: 2.9.10.3

From: pom.xmlmaven/io.jsonwebtoken/jjwt@0.9.1maven/com.fasterxml.jackson.core/jackson-databind@2.9.6

ℹ Read more on: This package | This alert | What is a critical CVE?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Remove or replace dependencies that include known critical CVEs. Consumers can use dependency overrides or npm audit fix --force to remove vulnerable dependencies.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore maven/com.fasterxml.jackson.core/jackson-databind@2.9.6. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Warn Critical
Critical CVE: Deserialization of Untrusted Data in jackson-databind in maven com.fasterxml.jackson.core:jackson-databind

CVE: GHSA-gww7-p5w4-wrfv Deserialization of Untrusted Data in jackson-databind (CRITICAL)

Affected versions: >= 2.0.0 < 2.6.7.4; >= 2.7.0 < 2.7.9.7; >= 2.8.0 < 2.8.11.5; >= 2.9.0 < 2.9.10.2

Patched version: 2.9.10.2

From: pom.xmlmaven/io.jsonwebtoken/jjwt@0.9.1maven/com.fasterxml.jackson.core/jackson-databind@2.9.6

ℹ Read more on: This package | This alert | What is a critical CVE?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Remove or replace dependencies that include known critical CVEs. Consumers can use dependency overrides or npm audit fix --force to remove vulnerable dependencies.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore maven/com.fasterxml.jackson.core/jackson-databind@2.9.6. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Warn Critical
Critical CVE: Arbitrary Code Execution in jackson-databind in maven com.fasterxml.jackson.core:jackson-databind

CVE: GHSA-4gq5-ch57-c2mg Arbitrary Code Execution in jackson-databind (CRITICAL)

Affected versions: >= 2.9.0 < 2.9.7; >= 2.8.0 < 2.8.11.3; >= 2.0.0 < 2.7.9.5

Patched version: 2.9.7

From: pom.xmlmaven/io.jsonwebtoken/jjwt@0.9.1maven/com.fasterxml.jackson.core/jackson-databind@2.9.6

ℹ Read more on: This package | This alert | What is a critical CVE?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Remove or replace dependencies that include known critical CVEs. Consumers can use dependency overrides or npm audit fix --force to remove vulnerable dependencies.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore maven/com.fasterxml.jackson.core/jackson-databind@2.9.6. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Warn Critical
Critical CVE: Server-Side Request Forgery (SSRF) in jackson-databind in maven com.fasterxml.jackson.core:jackson-databind

CVE: GHSA-9mxf-g3x6-wv74 Server-Side Request Forgery (SSRF) in jackson-databind (CRITICAL)

Affected versions: >= 2.9.0 < 2.9.7; >= 2.8.0 < 2.8.11.3; >= 2.7.0 < 2.7.9.5

Patched version: 2.9.7

From: pom.xmlmaven/io.jsonwebtoken/jjwt@0.9.1maven/com.fasterxml.jackson.core/jackson-databind@2.9.6

ℹ Read more on: This package | This alert | What is a critical CVE?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Remove or replace dependencies that include known critical CVEs. Consumers can use dependency overrides or npm audit fix --force to remove vulnerable dependencies.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore maven/com.fasterxml.jackson.core/jackson-databind@2.9.6. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Warn Critical
Critical CVE: maven com.fasterxml.jackson.core:jackson-databind vulnerable to Deserialization of Untrusted Data

CVE: GHSA-c8hm-7hpq-7jhg com.fasterxml.jackson.core:jackson-databind vulnerable to Deserialization of Untrusted Data (CRITICAL)

Affected versions: >= 2.9.0 < 2.9.8; >= 2.8.0 < 2.8.11.3; >= 2.7.0 < 2.7.9.5; >= 2.0.0 < 2.6.7.3

Patched version: 2.9.8

From: pom.xmlmaven/io.jsonwebtoken/jjwt@0.9.1maven/com.fasterxml.jackson.core/jackson-databind@2.9.6

ℹ Read more on: This package | This alert | What is a critical CVE?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Remove or replace dependencies that include known critical CVEs. Consumers can use dependency overrides or npm audit fix --force to remove vulnerable dependencies.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore maven/com.fasterxml.jackson.core/jackson-databind@2.9.6. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Warn Critical
Critical CVE: Deserialization of Untrusted Data in jackson-databind due to polymorphic deserialization in maven com.fasterxml.jackson.core:jackson-databind

CVE: GHSA-f9hv-mg5h-xcw9 Deserialization of Untrusted Data in jackson-databind due to polymorphic deserialization (CRITICAL)

Affected versions: >= 2.9.0 < 2.9.8; >= 2.8.0 < 2.8.11.3; >= 2.7.0 < 2.7.9.5

Patched version: 2.9.8

From: pom.xmlmaven/io.jsonwebtoken/jjwt@0.9.1maven/com.fasterxml.jackson.core/jackson-databind@2.9.6

ℹ Read more on: This package | This alert | What is a critical CVE?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Remove or replace dependencies that include known critical CVEs. Consumers can use dependency overrides or npm audit fix --force to remove vulnerable dependencies.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore maven/com.fasterxml.jackson.core/jackson-databind@2.9.6. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Warn Critical
Critical CVE: Deserialization of untrusted data in FasterXML jackson-databind in maven com.fasterxml.jackson.core:jackson-databind

CVE: GHSA-6fpp-rgj9-8rwc Deserialization of untrusted data in FasterXML jackson-databind (CRITICAL)

Affected versions: >= 2.9.0 < 2.9.9.2; >= 2.8.0 < 2.8.11.4; < 2.7.9.6

Patched version: 2.9.9.2

From: pom.xmlmaven/io.jsonwebtoken/jjwt@0.9.1maven/com.fasterxml.jackson.core/jackson-databind@2.9.6

ℹ Read more on: This package | This alert | What is a critical CVE?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Remove or replace dependencies that include known critical CVEs. Consumers can use dependency overrides or npm audit fix --force to remove vulnerable dependencies.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore maven/com.fasterxml.jackson.core/jackson-databind@2.9.6. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Warn Critical
Critical CVE: Polymorphic Typing issue in FasterXML jackson-databind in maven com.fasterxml.jackson.core:jackson-databind

CVE: GHSA-85cw-hj65-qqv9 Polymorphic Typing issue in FasterXML jackson-databind (CRITICAL)

Affected versions: >= 2.9.0 < 2.9.10; >= 2.7.0 < 2.8.11.5; < 2.6.7.3

Patched version: 2.9.10

From: pom.xmlmaven/io.jsonwebtoken/jjwt@0.9.1maven/com.fasterxml.jackson.core/jackson-databind@2.9.6

ℹ Read more on: This package | This alert | What is a critical CVE?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Remove or replace dependencies that include known critical CVEs. Consumers can use dependency overrides or npm audit fix --force to remove vulnerable dependencies.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore maven/com.fasterxml.jackson.core/jackson-databind@2.9.6. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Warn Critical
Critical CVE: Polymorphic Typing issue in FasterXML jackson-databind in maven com.fasterxml.jackson.core:jackson-databind

CVE: GHSA-h822-r4r5-v8jg Polymorphic Typing issue in FasterXML jackson-databind (CRITICAL)

Affected versions: >= 2.9.0 < 2.9.10; >= 2.7.0 < 2.8.11.5; < 2.6.7.3

Patched version: 2.9.10

From: pom.xmlmaven/io.jsonwebtoken/jjwt@0.9.1maven/com.fasterxml.jackson.core/jackson-databind@2.9.6

ℹ Read more on: This package | This alert | What is a critical CVE?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Remove or replace dependencies that include known critical CVEs. Consumers can use dependency overrides or npm audit fix --force to remove vulnerable dependencies.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore maven/com.fasterxml.jackson.core/jackson-databind@2.9.6. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Warn Critical
Critical CVE: Polymorphic Typing in FasterXML jackson-databind in maven com.fasterxml.jackson.core:jackson-databind

CVE: GHSA-mx7p-6679-8g3q Polymorphic Typing in FasterXML jackson-databind (CRITICAL)

Affected versions: >= 2.9.0 < 2.9.10.1; >= 2.7.0 < 2.8.11.5; >= 2.0.0 < 2.6.7.3

Patched version: 2.9.10.1

From: pom.xmlmaven/io.jsonwebtoken/jjwt@0.9.1maven/com.fasterxml.jackson.core/jackson-databind@2.9.6

ℹ Read more on: This package | This alert | What is a critical CVE?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Remove or replace dependencies that include known critical CVEs. Consumers can use dependency overrides or npm audit fix --force to remove vulnerable dependencies.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore maven/com.fasterxml.jackson.core/jackson-databind@2.9.6. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Warn Critical
Critical CVE: jackson-databind polymorphic typing issue in maven com.fasterxml.jackson.core:jackson-databind

CVE: GHSA-fmmc-742q-jg75 jackson-databind polymorphic typing issue (CRITICAL)

Affected versions: >= 2.9.0 < 2.9.10.1; >= 2.7.0 < 2.8.11.5; < 2.6.7.3

Patched version: 2.9.10.1

From: pom.xmlmaven/io.jsonwebtoken/jjwt@0.9.1maven/com.fasterxml.jackson.core/jackson-databind@2.9.6

ℹ Read more on: This package | This alert | What is a critical CVE?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Remove or replace dependencies that include known critical CVEs. Consumers can use dependency overrides or npm audit fix --force to remove vulnerable dependencies.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore maven/com.fasterxml.jackson.core/jackson-databind@2.9.6. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Warn Critical
Critical CVE: Improper Input Validation in jackson-databind in maven com.fasterxml.jackson.core:jackson-databind

CVE: GHSA-f3j5-rmmp-3fc5 Improper Input Validation in jackson-databind (CRITICAL)

Affected versions: >= 2.9.0 < 2.9.10; < 2.8.11.5

Patched version: 2.9.10

From: pom.xmlmaven/io.jsonwebtoken/jjwt@0.9.1maven/com.fasterxml.jackson.core/jackson-databind@2.9.6

ℹ Read more on: This package | This alert | What is a critical CVE?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Remove or replace dependencies that include known critical CVEs. Consumers can use dependency overrides or npm audit fix --force to remove vulnerable dependencies.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore maven/com.fasterxml.jackson.core/jackson-databind@2.9.6. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Warn Critical
Critical CVE: Arbitrary Code Execution in jackson-databind in maven com.fasterxml.jackson.core:jackson-databind

CVE: GHSA-645p-88qh-w398 Arbitrary Code Execution in jackson-databind (CRITICAL)

Affected versions: >= 2.9.0 < 2.9.7; >= 2.8.0 < 2.8.11.3; >= 2.7.0 < 2.7.9.5; >= 2.0.0 < 2.6.7.3

Patched version: 2.9.7

From: pom.xmlmaven/io.jsonwebtoken/jjwt@0.9.1maven/com.fasterxml.jackson.core/jackson-databind@2.9.6

ℹ Read more on: This package | This alert | What is a critical CVE?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Remove or replace dependencies that include known critical CVEs. Consumers can use dependency overrides or npm audit fix --force to remove vulnerable dependencies.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore maven/com.fasterxml.jackson.core/jackson-databind@2.9.6. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Warn Critical
Critical CVE: XML External Entity Reference (XXE) in jackson-databind in maven com.fasterxml.jackson.core:jackson-databind

CVE: GHSA-x2w5-5m2g-7h5m XML External Entity Reference (XXE) in jackson-databind (CRITICAL)

Affected versions: >= 2.9.0 < 2.9.7; >= 2.8.0 < 2.8.11.3; >= 2.7.0 < 2.7.9.5

Patched version: 2.9.7

From: pom.xmlmaven/io.jsonwebtoken/jjwt@0.9.1maven/com.fasterxml.jackson.core/jackson-databind@2.9.6

ℹ Read more on: This package | This alert | What is a critical CVE?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Remove or replace dependencies that include known critical CVEs. Consumers can use dependency overrides or npm audit fix --force to remove vulnerable dependencies.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore maven/com.fasterxml.jackson.core/jackson-databind@2.9.6. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

View full report

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants